SlideShare a Scribd company logo
1 of 9
Download to read offline
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/326408524
Handwritten Digit Recognition Using Machine Learning Algorithms
Article · March 2018
DOI: 10.17509/ijost.v3i1.10795
CITATIONS
19
READS
21,269
5 authors, including:
Some of the authors of this publication are also working on these related projects:
Antenna & Metamaterial View project
Handwritten Numeric and Alphabetic Character Recognition and Signature Verification Using Neural Network View project
S. M. Shamim
Mawlana Bhashani Science and Technology University
17 PUBLICATIONS   51 CITATIONS   
SEE PROFILE
Md Badrul Alam Miah
Mawlana Bhashani Science and Technology University
50 PUBLICATIONS   200 CITATIONS   
SEE PROFILE
Angona Sarker
Mawlana Bhashani Science and Technology University
12 PUBLICATIONS   77 CITATIONS   
SEE PROFILE
All content following this page was uploaded by S. M. Shamim on 15 July 2018.
The user has requested enhancement of the downloaded file.
© 2018. S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana & Abdullah Al Jobair. This is a
research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License
http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction in any
medium, provided the original work is properly cited.
Handwritten Digit Recognition using Machine Learning Algorithms
By S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana
& Abdullah Al Jobair
Mawlana Bhashani Science and Technology University
Abstract- Handwritten character recognition is one of the practically important issues in pattern
recognition applications. The applications of digit recognition includes in postal mail sorting,
bank check processing, form data entry, etc. The heart of the problem lies within the ability to
develop an efficient algorithm that can recognize hand written digits and which is submitted by
users by the way of a scanner, tablet, and other digital devices. This paper presents an approach
to off-line handwritten digit recognition based on different machine learning technique. The main
objective of this paper is to ensure effective and reliable approaches for recognition of
handwritten digits. Several machines learning algorithm namely, Multilayer Perceptron, Support
Vector Machine, Naïve Bayes, Bayes Net, Random Forest, J48 and Random Tree has been used
for the recognition of digits using WEKA.
Keywords: pattern recognition, handwritten recognition, digit recognition, machine learning, WEKA,
off-line handwritten recognition, machine learning algorithm, neural network, classification
algorithm.
GJCST-D Classification: I.7.5, I.2.7, I.5.m
HandwrittenDigitRecognitionusingMachineLearningAlgorithms
Strictly as per the compliance and regulations of:
Global Journal of Computer Science and Technology: D
Neural & Artificial Intelligence
Volume 18 Issue 1 Version 1.0 Year 2018
Type: Double Blind Peer Reviewed International Research Journal
Publisher: Global Journals
Online ISSN: 0975-4172 & Print ISSN: 0975-4350
Handwritten Digit Recognition using Machine
Learning Algorithms
S M Shamim α
, Mohammad Badrul Alam Miah σ
, Angona Sarker ρ
, Masud Rana Ѡ
& Abdullah Al Jobair ¥
Abstract- Handwritten character recognition is one of the
practically important issues in pattern recognition applications.
The applications of digit recognition includes in postal mail
sorting, bank check processing, form data entry, etc. The heart
of the problem lies within the ability to develop an efficient
algorithm that can recognize hand written digits and which is
submitted by users by the way of a scanner, tablet, and other
digital devices. This paper presents an approach to off-line
handwritten digit recognition based on different machine
learning technique. The main objective of this paper is to
ensure effective and reliable approaches for recognition of
handwritten digits. Several machines learning algorithm
namely, Multilayer Perceptron, Support Vector Machine, Naïve
Bayes, Bayes Net, Random Forest, J48 and Random Tree has
been used for the recognition of digits using WEKA. The result
of this paper shows that highest 90.37% accuracy has been
obtained for Multilayer Perceptron.
Keywords: pattern recognition, handwritten recognition,
digit recognition, machine learning, WEKA, off-line
handwritten recognition, machine learning algorithm,
neural network, classification algorithm.
I. Introduction
ntelligent image analysis is an appealing research
area in Artificial Intelligence and also crucial for a
variety of present open research difficulties.
Handwritten digits recognition is a well-researched
subarea within the field that is concerned with learning
models to distinguish pre-segmented handwritten digits.
It is one of the most important issues in data mining,
machine learning, pattern recognition along with many
other disciplines of artificial intelligence [1].The main
application of machine learning methods over the last
decade has determined efficacious in conforming
decisive systems which are competing to human
performance and which accomplish far improved than
manually written classical artificial intelligence systems
used in the beginnings of optical character recognition
technology [2]. However, not all features of those
specific models have been previously inspected.
A great attempt of research worker in machine
learning and data mining has been contrived to achieve
efficient approaches for approximation of recognition
from data [3]. In twenty first Century handwritten digit
communication has its own standard and most of the
times in daily life are being used as means of
conversation and recording the information to be shared
with individuals. One of the challenges in handwritten
characters recognition wholly lies in the variation and
distortion of handwritten character set because distinct
community may use diverse style of handwriting, and
control to draw the similar pattern of the characters of
their recognized script.
Identification of digit from where best
discriminating features can be extracted is one of the
major tasks in the area of digit recognition system. To
locate such regions different kind of region sampling
techniques are used in pattern recognition [4].The
challenge in handwritten character recognition is mainly
caused by the large variation of individual writing styles
[5]. Hence, robust feature extraction is very important to
improve the performance of a handwritten character
recognition system. Nowadays handwritten digit
recognition has obtained lot of concentration in the area
of pattern recognition system sowing to its application in
diverse fields. In next days, character recognition
system might serve as a cornerstone to initiate
paperless surroundings by digitizing and processing
existing paper documents.
Handwritten digit dataset are vague in nature
because there may not always be sharp and perfectly
straight lines. The main goal in digit recognition is
feature extraction is to remove the redundancy from the
data and gain a more effective embodiment of the word
image through a set of numerical attributes. It deals with
extracting most of the essential information from image
raw data [6]. In addition the curves are not necessarily
smooth like the printed characters. Furthermore,
characters dataset can be drawn in different sizes and
the orientation which are always supposed to be written
on a guideline in an upright or downright point.
Accordingly, an efficient handwritten recognition system
can be developed by considering these limitations. It is
quiet exhausting that sometimes to identify hand written
characters as it can be seen that most of the human
beings can’t even recognize their own written scripts.
Hence, there exists constraint for a writer to write
apparently for recognition of handwritten documents.
Before revealing the method used in conducting
this research, software engineering module is first
presented. Pattern recognition along with Image
processing plays compelling role in the area of
handwritten character recognition. The study [7],
describes numerous types of classification of feature
extraction techniques like structural feature based
I
© 2018 Global Journals
Author α σ ρ Ѡ ¥: Department of Information and Communication
Technology, Mawlana Bhashani Science and Technology University,
Santosh, Tangail-1902. e-mail: ictshamim@yahoo.com
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
17
Year
2018
(
)
D
methods, statistical feature based methods and global
transformation techniques. Statistical approaches are
established on planning of how data are selected. It
utilizes the information of the statistical distribution of
pixels in the image. The paper [8], provided SVM based
offline handwritten digit recognition system. Authors
claim that SVM outperforms in the experiment.
Experiment is carried out on NIST SD19 standard
dataset. The study [9] provide the conversion of
handwritten data into electronic data, nature of
handwritten characters and the neural network approach
to form machine competent of recognizing hand written
characters. The study [10] addresses a comprehensive
criterion of handwritten digit recognition with various
state of the art approaches, feature representations, and
datasets. However, the relationship of training set size
versus accuracy/error and the dataset-independence of
the trained models are analyzed. The paper [11]
presents convolution neural networks into the
handwritten digit recognition research and describes a
system which can still be considered state of the art.
II. Methods and Materials
a) Multilayer Perceptions
A neural network based classifier, called Multi-
Layer perception (MLP), is used to classify the
handwritten digits. Multilayer perceptron consists of
three different layers, input layer, hidden layer and
output layer. Each of the layers can have certain number
of nodes also called neurons and each node in a layer is
connected to all other nodes to the next layer [12]. For
this reason it is also known as feed forward network. The
number of nodes in the input layer depends upon the
number of attributes present in the dataset. The number
of nodes in the output layer relies on the number of
apparent classes exist in the dataset. The convenient
number of hidden layers or the convenient number of
nodes in a hidden layer for a specific problem is hard to
determine. But in general, these numbers are selected
experimentally. In multilayer perceptron, the connection
between two nodes consists of a weight. During training
process, it basically learns the accurate weight
adjustment which is corresponds to each connection
[13]. For the learning purpose, it uses a supervised
learning technique named as Back propagation
algorithm.
b) Support Vector Machine
SVM or Support Vector Machine is a specific
type of supervised ML method that intents to classify the
data points by maximizing the margin among classes in
a high-dimensional space [14]. SVM is a representation
of examples as points in space, mapped due to the
examples of the separate classes are divided by a fair
gap that is as extensive as possible. After that new
examples are mapped into that same space and
anticipated to reside to a category based on which side
of the gap they fall on [15]. The optimum algorithm is
developed through a “training” phase in which training
data are adopted to develop an algorithm capable to
discriminate between groups earlier defined by the
operator (e.g. patients vs. controls), and the “testing”
phase in which the algorithm is adopted to blind-predict
the group to which a new perception belongs [16]. It
also provides a very accurate classification performance
over the training records and produces enough search
space for the accurate classification of future data
parameters. Hence it always ensures a series of
parameter combinations no less than on a sensible
subset of the data. In SVM it’s better to scale the data
always; because it will extremely improve the results.
Therefore be cautious with big dataset, as it may leads
to the increase in the training time.
c) J48
The J48 algorithm is developed for the MONK
project along with WEKA [17]. The algorithm is an
extension for C4.5 decision tree algorithm [18]. There
are many options for tree pruning in case of J48
algorithm. The classification algorithms convenient in
WEKA try to clarify the results or prune. This method will
help us to produces more generic results and also can
be used to correct potential over fitting issues. J48 helps
to recursively classify until each of the leaf is pruned,
that is to classify as close knit to the data. Hence this will
helps to ensure the accuracy, although excessive rules
will be produced. However pruning will cause to less
accuracy of a model on training data. This is due to
pruning employs various means to relax the specificity
of the decision tree, hopefully improving its performance
on the test data. The complete concept is to
increasingly generalize a decision tree until it gains a
balance of accuracy together with flexibility. The J48
applies two pruning methods. First one is known as
subtree replacement. This concludes that nodes in the
decision tree can be replaced with a leaf -- which
reduces the number of tests along a particular path. This
process begins from the leaves of the completely
formed tree, and attempts backwards toward the root.
Second category of pruning adopted in J48 is termed
subtree rising. In this respect, a node can be moved
upwards towards the root of the tree, replacing other
nodes another way. Subtree rising repeatedly has a
insignificant effect on decision tree models. There is
generally no clear way to anticipate the utility of the
option, though it may be desirable to try turning it off if
the induction process is catching a long time. This is
because of the fact that subtree rising may be
somewhat computationally complicated. Error rates are
needed to make actual conclusions about which parts
of the tree to rise or replace. There exist multiple ways to
perform this. The straight forward way is to reserve a
portion of the training data in order to test on decision
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
1
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
18
Year
2018
(
)
D
tree. Reserved portion may then be adopted as test
data for the decision tree, aiding to reduce potential over
fitting. This method is recognized as reduced-error
pruning. Though the approach is straightforward, it also
decreases the overall volume of data available for
training the model. For specifically small datasets, it may
be advisable to avert using reduced error pruning.
d) Random Forest Algorithm
Random forest as is an ensemble of un-pruned
regression or classification trees, activated from
bootstrap samples of the training data, adopting
random feature selection in the tree imitation process.
The prediction is made by accumulating the predictions
of the ensemble by superiority voting for classification. It
returns generalization error rate and is more potent to
noise. Still, similar to most classifiers, RF may also suffer
from the curse of learning from an intensely imbalanced
training data set. Since it is constructed to mitigate the
overall error rate, it will tend to focus more on the
prediction efficiency of the majority class, which
repeatedly results in poor accuracy for the minority
class.
e) Naive Bayes
The Naive Bayes classifier [19] contributes a
simple method, representing and learning probabilistic
knowledge with clear semantics. It is termed naive due
to it relies on two important simplifying assumes that
predictive attributes are conditionally self-reliant given
the class, and it considers that no hidden attributes
influence the prediction method. It is a probabilistic
classifier which relies upon Bayes theorem with robust
and naive independence assumptions. It is one of the
best basic text classification approaches with numerous
applications in personal email sorting, email spam
detection, sexually explicit content detection, document
categorization, sentiment detection, language detection
[20]. Although the naïve design and oversimplified
assumptions that this approach uses, Naive Bayes
accomplishes well in many complicated real-world
problems. All though it is often out performed by other
approaches such as boosted trees, Max Entropy,
Support Vector Machines, random forests etc, Naive
Bayes classifier is very potent as it is less
computationally intensive (in both memory and CPU)
and it needs a small extent of training data. Moreover,
the training time with Naive Bayes is considerably
smaller as opposed to alternative approaches.
f) Bayes Net
Bayesian networks are a powerful probabilistic
representation, and their use for classification has
received considerable attention [21]. It reflects the
states of some part of a world that is being modeled
and it describes how those states are related by
probabilities. Bayesian network is a graphical model that
encodes probabilistic relationships among variables of
interest. When used in conjunction with statistical
techniques, the graphical model has several advantages
for data analysis. One, because the model encodes
dependencies among all variables, it readily handles
situations where some data entries are missing. Two, a
Bayesian network can be used to learn causal
relationships, and hence can be used to gain
understanding about a problem domain and to predict
the consequences of intervention. This classifier learns
from training data the conditional probability of each
attribute given the class label [22, 23].
g) Random Tree
The algorithm may deal with both regression
and classification problems. Random trees is a
ensemble of tree predictors which is called forest .The
classification performs as follows: random trees
classifier takes the input feature vector, categories it with
individual tree in the forest, outputs the class label which
received the most of “votes”. In the event of a
regression, the classifier response is the average of the
responses over all the trees in the forest [24]. In random
tree algorithm all the trees are trained with the same
parameters but on different training sets. These sets are
created from the original training set adopting the
bootstrap procedure and for each training set, randomly
choose the same number of vectors as in the initial set.
The vectors are chosen with replacement. That is, some
vectors will occur more than once and some will be
absent. In random trees there is no need for any
accuracy estimation techniques, like cross-validation or
bootstrap, or a separate test set to obtain an estimate of
the training error. The error is estimated internally during
the training.
h) Dataset Description
The handwritten digit recognition is a extensive
research topic which gives a comprehensive survey of
the area including major feature sets, learning datasets,
and algorithms [25]. Contrary to optical character
recognition which focuses on recognition of machine-
printed output, where special fonts can be used and the
variability between characters along with the same size,
font, and font attributes is fairly small.
The feature extraction and the classification
technique play an important role in offline character
recognition system performance. Various feature
extraction approaches have been proposed for
character recognition system [26]. The problems faced
in handwritten numeral recognition has been studied
while using the techniques like Dynamic programming,
HMM, neural network, Knowledge system and
combinations of above techniques [27]. Wider ranging
work has been carried out for digit recognition in so
many languages like English, Chinese, Japanese, and
Arabic. In Indian mainly worked in Devanagari, Tamil,
Telugu and Bengali numeral recognition [28].
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
19
Year
2018
(
)
D
In our experiment we used digit dataset
provided by Austrian Research Institute for Artificial
Intelligence, Austria. This data set indicate that arbitrary
scaling and a blur setting of 2.5 for the Mitchell down-
sampling filter should perform well and used down-
sample to 16x16 pixels.
Figure 1: A small portion of handwritten dataset example
This dataset is divided in two parts training set
and testing set. Training set has 1893 samples and test
set has 1796 samples. The detail of the dataset is
provided in [29].
III. Experimental Tools
Waikato Environment for Knowledge Analysis
(WEKA) is a prominent suite of machine learning which
is written in Java and developed at the University of
Waikato. It is free software accessible under the GNU
General Public License. It contains a collection of
algorithms and visualization tools for predictive
modelling, data analysis, along with graphical user
interfaces for smooth access to this functionality [30]. It
supports various standard data mining tasks, more
particularly, data pre-processing, classification,
visualization, clustering, feature selection, regression.
All of Weka's approaches are predicated on the
assumption that the data is convenient as a single flat
file or relation, where each data point is characterized
through a fixed number of attributes [31].
WEKA has numerous user interfaces. Its main
user interface is the Explorer, however essentially the
same functionality can be accessed by the component-
based Knowledge Flow interface and from the
command line. The Experimenter allows the systematic
comparison of the predictive performance of the Weka's
machine learning algorithms on an accumulation of
datasets.
IV. Experimental Result and Discussion
WEKA has several graphical user interfaces that
enable easy access to the underlying functionality. To
gauge and investigate the performance on the selected
methods or algorithms namely Support Vector Machine,
Multilayer Perceptron, Random Forest Algorithm,
Random Tree, Naïve Bayes, Bayes Net and j48 Decision
tree algorithms are used. We use the same experiment
procedure as suggested by WEKA.
In WEKA, all dataset is considered as instances
and features in the data are also known as attributes.
The experiment results are partitioned into several sub
division for easier analysis and evaluation. In the first
part, correctly and incorrectly classified instances will be
divided in numeric and percentage value and
subsequently Kappa statistic, mean absolute error and
root mean squared error will be in numeric value.
Experiment shows the relative absolute error and root
relative squared error in percentage (%) for references
and in evaluation process. Our simulation results are
shown in below tables-1 and tables-2. In table-1 mainly
summarizes the result based on accuracy and time
taken for each simulation in our experiment. Moreover,
table-2 shows the result based on error during the
simulation in WEKA.
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
1
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
20
Year
2018
(
)
D
Table 1: Simulation result based on accuracy and time consumption
Table 2: Simulation result based on different error
Based on the above table-1, the highest
accuracy is 90.37 % and the lowest is 75.06%. The other
algorithm yields an average accuracy of around 83.89%.
In fact, the highest accuracy belongs to the Multilayer
Perceptron classifier, followed by Support Vector
Machine with a percentage of 87.97% and subsequently
Random Forest Algorithm 85.75%, Bayes Net 84.35%,
Naïve Bayes 81.85%, j48 79.51% and Random Tree
75.06%. Kappa statistics value ranges from 0 to 1. Value
0 means totally disagreement and 1 means full
agreement. It checks the reliability of Classifying
algorithm on dataset. The total time, mean absolute
error, root mean absolute error, relative absolute error
and root relative absolute error is also a crucial
parameter to build the model in comparing the different
classification algorithm. Mean absolute error is the mean
of overall error made by classification algorithm and
least the error will be best classifier. In the table-2
Multilayer Perceptron has least 0.023 mean absolute
errors among all seven algorithms.
In [32] experimental results reveal that it is
possible to train a face detector without having to label
images as containing a face or not. Their experiment is
only sensitive to high-level concepts such as cat faces
and human bodies. Multi-column deep neural networks
for image classification have been presented in [33].
They only improve the state-of-the-art on a plethora of
common image classification benchmarks. Supervised
learning unsupervised learning, reinforcement learning &
evolutionary computation, and indirect search for short
programs encoding deep and large networks has been
presented in [34]. They only proposed how different
Name of Algorithms
Correctly
Classified
Instances
% (value)
Incorrectly
Classified
Instances
% (Value)
Time
Taken
(seconds)
Kappa
Statistic
Multilayer Perceptron 90.37 9.63 3.15 0.893
Support Vector
Machine
87.97 12.03 0.56 0.8664
Random Forest 85.75 14.25 0.44 0.8416
Bayes Net 84.35 15.65 0.86 0.8262
Naïve Bayes 81.85 18.15 3.45 0.7983
J48 79.51 20.49 0.53 0.7722
Random Tree 85.6 24.94 0.55 0.7228
Name of Algorithms
Mean
Absolute
Error
Root Mean
Squared Error
Relative
Absolute
Error (%)
Root Relative
Squared Error (%)
Multilayer Perceptron 0.023 0.1231 12.78 41.04
Support Vector
Machine
0.1611 0.2734 89.49 91.15
Random Forest 0.0593 0.1532 32.97 51.06
Bayes Net 0.0312 0.1745 17.36 58.15
Naïve Bayes 0.0361 0.1879 20.06 62.65
J48 0.0444 0.1957 24.66 65.25
Random Tree 0.0499 0.2234 27.72 74.45
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
21
Year
2018
(
)
D
technique can be used for pattern recognition. In [35]
recognition of handwritten bangla basic characters and
digits using convex hull based feature set has been
proposed. Their experiment result shows that with a
database of 10000 samples, the maximum recognition
rate of 76.86% is observed for handwritten Bangla
characters. Online and offline handwritten Chinese
character recognition has been proposed in [36]. Their
experiment result reported that the highest test
accuracies 89.55% for offline. In our experiment different
machine learning algorithm has been used for handwrite
digit recognition and obtained highest 90.37% accuracy
obtained for Multilayer Perceptron.
V. Conclusion
The main objective of this investigation is to find
a representation of isolated handwritten digits that allow
their effective recognition. In this paper used different
machine learning algorithm for recognition of
handwritten numerals. In any recognition process, the
important problem is to address the feature extraction
and correct classification approaches. The proposed
algorithm tries to address both the factors and well in
terms of accuracy and time complexity. The overall
highest accuracy 90.37% is achieved in the recognition
process by Multilayer Perceptron. This work is carried
out as an initial attempt, and the aim of the paper is to
facilitate for recognition of handwritten numeral without
using any standard classification techniques.
References Références Referencias
1. Watada, J., & Pedrycz, W. A fuzzy regression
approach to acquisition of linguistic rules.
Handbook of Granular Computing, 719-732, 2008.
2. Seewald, A. K. (2011). On the brittleness of
handwritten digit recognition models. ISRN Machine
Vision, 2012.
3. Kloesgen, W., & Zytkow, J. Handbook of Knowledge
Discovery and Data Mining.
4. Das, N., Sarkar, R., Basu, S., Kundu, M., Nasipuri,
M., & Basu, D. K. A genetic algorithm based region
sampling for selection of local features in
handwritten digit recognition application. Applied
Soft Computing, 12(5), 1592-1606, 2012.
5. Plamondon, R., & Srihari, S. N. Online and off-line
handwriting recognition: a comprehensive survey.
IEEE Transactions on Pattern Analysis and Machine
Intelligence, 22(1), 63-84.
6. AlKhateeb, J. H., Pauplin, O., Ren, J., & Jiang, J..
Performance of hidden Markov model and dynamic
Bayesian network classifiers on handwritten Arabic
word recognition. knowledge-based systems, 24(5),
680-688, 2011.
7. Tokas, R., & Bhadu, A. A comparative analysis of
feature extraction techniques for handwritten
character recognition. International Journal of
Advanced Technology & Engineering
Research, 2(4), 215-219, 2012.
8. Neves, R. F., Alberto Filho, N. G., Mello, C. A., &
Zanchettin, C. A SVM based off-line handwritten
digit recognizer. In System, IEEE International
Conference on Man, and Cybernetics (SMC) (pp.
510-515), 2011.
9. Perwej, Y., & Chaturvedi, A. Machine recognition of
hand written characters using neural networks. arXiv
preprint arXiv:1205.3964, 2012.
10. Liu, C. L., Nakashima, K., Sako, H., & Fujisawa, H.
Handwritten digit recognition: benchmarking of
state-of-the-art techniques. Pattern Recognition,
36(10), 2271-2285.
11. LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P.
(1998). Gradient-based learning applied to
document recognition. Proceedings of the
IEEE, 86(11), 2278-2324.
12. Bhowmik, S., Roushan, M. G., Sarkar, R., Nasipuri,
M., Polley, S., & Malakar, S. Handwritten Bangla
Word Recognition Using HOG Descriptor. In 2014
Fourth International Conference of Emerging
Applications of Information Technology (EAIT), (pp.
193-197). IEEE, 2014.
13. Kruse, R., Borgelt, C., Klawonn, F., Moewes, C.,
Steinbrecher, M., & Held, P. Multi-Layer
Perceptrons. In Computational Intelligence (pp. 47-
81). Springer London, 2013.
14. Pereira, F., Mitchell, T., & Botvinick, M. Machine
learning classifiers and fMRI: a tutorial overview.
Neuroimage, 45(1), S199-S209, 2009.
15. Support Vector Machine, Online: https://en.
wikipedia.org/wiki/Support_vector_machine,
Accessed, August 2015.
16. Orrù, G., Pettersson-Yeo, W., Marquand, A. F.,
Sartori, G., & Mechelli, A. Using support vector
machine to identify imaging biomarkers of
neurological and psychiatric disease: a critical
review. Neuroscience & Biobehavioral Reviews,
36(4), 1140-1152, 2012.
17. Cooper, G. F., & Herskovits, E. A Bayesian method
for constructing Bayesian belief networks from
databases. In Proceedings of the Seventh
conference on Uncertainty in Artificial Intelligence
(pp. 86-94). Morgan Kaufmann Publishers Inc.
18. Salzberg, S. L. C4. 5: Programs for machine
learning by j. ross quinlan. morgan kaufmann
publishers, inc., 1993. Machine Learning, 16(3),
235-240.
19. John, G. H., & Langley, P. Estimating continuous
distributions in Bayesian classifiers. In Proceedings
of the Eleventh conference on Uncertainty in artificial
intelligence (pp. 338-345). Morgan Kaufmann
Publishers Inc.
20. Nguyen, H. A., & Choi, D. Application of data mining
to network intrusion detection: classifier selection
model. In Challenges for Next Generation Network
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
1
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
22
Year
2018
(
)
D
Operations and Service Management (pp. 399-408).
Springer Berlin Heidelberg, 2008.
21. Bin Othman, M. F., & Yau, T. M. S. Comparison of
different classification techniques using WEKA for
breast cancer. In 3rd Kuala Lumpur International
Conference on Biomedical Engineering 2006 (pp.
520-523). Springer Berlin Heidelberg.
22. Bouckaert, R. R. Properties of Bayesian belief
network learning algorithms. In Proceedings of the
Tenth international conference on Uncertainty in
artificial intelligence (pp. 102-109). Morgan
Kaufmann Publishers Inc.
23. Buntine, W. Theory refinement on Bayesian
networks. In Proceedings of the Seventh conference
on Uncertainty in Artificial Intelligence(pp. 52-60).
Morgan Kaufmann Publishers Inc.
24. Random trees, Online: http://docs.opencv.org/
modules/ml/doc/random_trees.html, Accessed,
August 2015.
25. Trier, Ø. D., Jain, A. K., & Taxt, T. Feature extraction
methods for character recognition-a survey. Pattern
recognition, 29(4), 641-662.
26. Koerich, A. L., Sabourin, R., & Suen, C. Y. Large
vocabulary off-line handwriting recognition: A
survey. Pattern Analysis & Applications, 6(2), 97-121.
27. Rahman, A. F. R., Rahman, R., & Fairhurst, M. C.
Recognition of handwritten Bengali characters: a
novel multistage approach. Pattern Recognition,
35(5), 997-1006.
28. Chandrasekaran, R., Chandrasekaran, M., &
Siromoney, G. Computer recognition of Tamil,
Malayalam and Devanagari characters. Journal of
the Institution of Electronics and Telecommunication
Engineers, 30(6), 150-154.
29. Seewald, A. K. Digits-a dataset for handwritten digit
recognition.Austrian Research Institut for Artificial
Intelligence Technical Report, Vienna (Austria).
30. Weka Software Documentation, Online: http://www.
cs.waikato.ac.nz/ml/weka/,accessed, August 2015.
31. Weka (Machine Learning)Online: https://en.
wikipedia.org/wiki/Weka_(machine_learning),
accessed, August 2015.
32. Le, Q. V. (2013, May). Building high-level features
using large scale unsupervised learning. In 2013
IEEE international conference on acoustics, speech
and signal processing (pp. 8595-8598). IEEE.
33. Ciregan, D., Meier, U., & Schmidhuber, J. (2012,
June). Multi-column deep neural networks for image
classification. IEEE Conference on Computer Vision
and Pattern Recognition (CVPR), (pp. 3642-3649).
IEEE.
34. Schmidhuber, J. (2015). Deep learning in neural
networks: An overview. Neural Networks, 61, 85-117.
Elsevier.
35. Das, N., Pramanik, S., Basu, S., Saha, P. K., Sarkar,
R., Kundu, M., & Nasipuri, M. (2014). Recognition of
handwritten Bangla basic characters and digits
using convex hull based feature set. arXiv preprint
arXiv:1410.0478.
36. Liu, C. L., Yin, F., Wang, D. H., & Wang, Q. F.
(2013). Online and offline handwritten Chinese
character recognition: benchmarking on new
databases. Pattern Recognition, 46(1), 155-162.
Handwritten Digit Recognition using Machine Learning Algorithms
© 2018 Global Journals
Global
Journal
of
Computer
Science
and
Technology
Volume
XVIII
Issue
I
Version
I
23
Year
2018
(
)
D
View publication stats
View publication stats

More Related Content

What's hot

11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...Alexander Decker
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognitionBIJIT GHOSH
 
Technology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learningTechnology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learningeSAT Journals
 
Various Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A SurveyVarious Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A Surveyidescitation
 
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...rahulmonikasharma
 
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET Journal
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET Journal
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big datajournalBEEI
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...eSAT Publishing House
 
IRJET- Photo Optical Character Recognition Model
IRJET- Photo Optical Character Recognition ModelIRJET- Photo Optical Character Recognition Model
IRJET- Photo Optical Character Recognition ModelIRJET Journal
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001IJARTES
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Text region extraction from low resolution display board ima
Text region extraction from low resolution display board imaText region extraction from low resolution display board ima
Text region extraction from low resolution display board imaIAEME Publication
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Editor IJARCET
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
Character recognition of kannada text in scene images using neural
Character recognition of kannada text in scene images using neuralCharacter recognition of kannada text in scene images using neural
Character recognition of kannada text in scene images using neuralIAEME Publication
 

What's hot (19)

Text Mining
Text MiningText Mining
Text Mining
 
11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 
Technology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learningTechnology analysis for internet of things using big data learning
Technology analysis for internet of things using big data learning
 
Various Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A SurveyVarious Mathematical and Geometrical Models for Fingerprints: A Survey
Various Mathematical and Geometrical Models for Fingerprints: A Survey
 
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
Design and Implementation Recognition System for Handwritten Hindi/Marathi Do...
 
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...IRJET-  	  Detection and Recognition of Hypertexts in Imagery using Text Reco...
IRJET- Detection and Recognition of Hypertexts in Imagery using Text Reco...
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep Learning
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...
 
IRJET- Photo Optical Character Recognition Model
IRJET- Photo Optical Character Recognition ModelIRJET- Photo Optical Character Recognition Model
IRJET- Photo Optical Character Recognition Model
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Text region extraction from low resolution display board ima
Text region extraction from low resolution display board imaText region extraction from low resolution display board ima
Text region extraction from low resolution display board ima
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Character recognition of kannada text in scene images using neural
Character recognition of kannada text in scene images using neuralCharacter recognition of kannada text in scene images using neural
Character recognition of kannada text in scene images using neural
 

Similar to HandwrittenDigitRecognitionusing.pdf

Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNIRJET Journal
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AIIRJET Journal
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...IAESIJAI
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsKarla Adamson
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataDr. Amarjeet Singh
 
Online Handwriting Recognition using HMM
Online Handwriting Recognition using HMMOnline Handwriting Recognition using HMM
Online Handwriting Recognition using HMMrahulmonikasharma
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
 
A Deep Learning Approach to Recognize Cursive Handwriting
A Deep Learning Approach to Recognize Cursive HandwritingA Deep Learning Approach to Recognize Cursive Handwriting
A Deep Learning Approach to Recognize Cursive HandwritingIRJET Journal
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...AM Publications
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
Bangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfBangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfKhondokerAbuNaim
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognitionijtsrd
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 

Similar to HandwrittenDigitRecognitionusing.pdf (20)

Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AI
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...Source printer identification using convolutional neural network and transfer...
Source printer identification using convolutional neural network and transfer...
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
A Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different ScriptsA Review On Recognition Of Online Handwriting In Different Scripts
A Review On Recognition Of Online Handwriting In Different Scripts
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 
Online Handwriting Recognition using HMM
Online Handwriting Recognition using HMMOnline Handwriting Recognition using HMM
Online Handwriting Recognition using HMM
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
A Deep Learning Approach to Recognize Cursive Handwriting
A Deep Learning Approach to Recognize Cursive HandwritingA Deep Learning Approach to Recognize Cursive Handwriting
A Deep Learning Approach to Recognize Cursive Handwriting
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
Bangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdfBangla_handwritten_dig1] final proposal .pdf
Bangla_handwritten_dig1] final proposal .pdf
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 

Recently uploaded

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

HandwrittenDigitRecognitionusing.pdf

  • 1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/326408524 Handwritten Digit Recognition Using Machine Learning Algorithms Article · March 2018 DOI: 10.17509/ijost.v3i1.10795 CITATIONS 19 READS 21,269 5 authors, including: Some of the authors of this publication are also working on these related projects: Antenna & Metamaterial View project Handwritten Numeric and Alphabetic Character Recognition and Signature Verification Using Neural Network View project S. M. Shamim Mawlana Bhashani Science and Technology University 17 PUBLICATIONS   51 CITATIONS    SEE PROFILE Md Badrul Alam Miah Mawlana Bhashani Science and Technology University 50 PUBLICATIONS   200 CITATIONS    SEE PROFILE Angona Sarker Mawlana Bhashani Science and Technology University 12 PUBLICATIONS   77 CITATIONS    SEE PROFILE All content following this page was uploaded by S. M. Shamim on 15 July 2018. The user has requested enhancement of the downloaded file.
  • 2. © 2018. S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana & Abdullah Al Jobair. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Handwritten Digit Recognition using Machine Learning Algorithms By S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana & Abdullah Al Jobair Mawlana Bhashani Science and Technology University Abstract- Handwritten character recognition is one of the practically important issues in pattern recognition applications. The applications of digit recognition includes in postal mail sorting, bank check processing, form data entry, etc. The heart of the problem lies within the ability to develop an efficient algorithm that can recognize hand written digits and which is submitted by users by the way of a scanner, tablet, and other digital devices. This paper presents an approach to off-line handwritten digit recognition based on different machine learning technique. The main objective of this paper is to ensure effective and reliable approaches for recognition of handwritten digits. Several machines learning algorithm namely, Multilayer Perceptron, Support Vector Machine, Naïve Bayes, Bayes Net, Random Forest, J48 and Random Tree has been used for the recognition of digits using WEKA. Keywords: pattern recognition, handwritten recognition, digit recognition, machine learning, WEKA, off-line handwritten recognition, machine learning algorithm, neural network, classification algorithm. GJCST-D Classification: I.7.5, I.2.7, I.5.m HandwrittenDigitRecognitionusingMachineLearningAlgorithms Strictly as per the compliance and regulations of: Global Journal of Computer Science and Technology: D Neural & Artificial Intelligence Volume 18 Issue 1 Version 1.0 Year 2018 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online ISSN: 0975-4172 & Print ISSN: 0975-4350
  • 3. Handwritten Digit Recognition using Machine Learning Algorithms S M Shamim α , Mohammad Badrul Alam Miah σ , Angona Sarker ρ , Masud Rana Ѡ & Abdullah Al Jobair ¥ Abstract- Handwritten character recognition is one of the practically important issues in pattern recognition applications. The applications of digit recognition includes in postal mail sorting, bank check processing, form data entry, etc. The heart of the problem lies within the ability to develop an efficient algorithm that can recognize hand written digits and which is submitted by users by the way of a scanner, tablet, and other digital devices. This paper presents an approach to off-line handwritten digit recognition based on different machine learning technique. The main objective of this paper is to ensure effective and reliable approaches for recognition of handwritten digits. Several machines learning algorithm namely, Multilayer Perceptron, Support Vector Machine, Naïve Bayes, Bayes Net, Random Forest, J48 and Random Tree has been used for the recognition of digits using WEKA. The result of this paper shows that highest 90.37% accuracy has been obtained for Multilayer Perceptron. Keywords: pattern recognition, handwritten recognition, digit recognition, machine learning, WEKA, off-line handwritten recognition, machine learning algorithm, neural network, classification algorithm. I. Introduction ntelligent image analysis is an appealing research area in Artificial Intelligence and also crucial for a variety of present open research difficulties. Handwritten digits recognition is a well-researched subarea within the field that is concerned with learning models to distinguish pre-segmented handwritten digits. It is one of the most important issues in data mining, machine learning, pattern recognition along with many other disciplines of artificial intelligence [1].The main application of machine learning methods over the last decade has determined efficacious in conforming decisive systems which are competing to human performance and which accomplish far improved than manually written classical artificial intelligence systems used in the beginnings of optical character recognition technology [2]. However, not all features of those specific models have been previously inspected. A great attempt of research worker in machine learning and data mining has been contrived to achieve efficient approaches for approximation of recognition from data [3]. In twenty first Century handwritten digit communication has its own standard and most of the times in daily life are being used as means of conversation and recording the information to be shared with individuals. One of the challenges in handwritten characters recognition wholly lies in the variation and distortion of handwritten character set because distinct community may use diverse style of handwriting, and control to draw the similar pattern of the characters of their recognized script. Identification of digit from where best discriminating features can be extracted is one of the major tasks in the area of digit recognition system. To locate such regions different kind of region sampling techniques are used in pattern recognition [4].The challenge in handwritten character recognition is mainly caused by the large variation of individual writing styles [5]. Hence, robust feature extraction is very important to improve the performance of a handwritten character recognition system. Nowadays handwritten digit recognition has obtained lot of concentration in the area of pattern recognition system sowing to its application in diverse fields. In next days, character recognition system might serve as a cornerstone to initiate paperless surroundings by digitizing and processing existing paper documents. Handwritten digit dataset are vague in nature because there may not always be sharp and perfectly straight lines. The main goal in digit recognition is feature extraction is to remove the redundancy from the data and gain a more effective embodiment of the word image through a set of numerical attributes. It deals with extracting most of the essential information from image raw data [6]. In addition the curves are not necessarily smooth like the printed characters. Furthermore, characters dataset can be drawn in different sizes and the orientation which are always supposed to be written on a guideline in an upright or downright point. Accordingly, an efficient handwritten recognition system can be developed by considering these limitations. It is quiet exhausting that sometimes to identify hand written characters as it can be seen that most of the human beings can’t even recognize their own written scripts. Hence, there exists constraint for a writer to write apparently for recognition of handwritten documents. Before revealing the method used in conducting this research, software engineering module is first presented. Pattern recognition along with Image processing plays compelling role in the area of handwritten character recognition. The study [7], describes numerous types of classification of feature extraction techniques like structural feature based I © 2018 Global Journals Author α σ ρ Ѡ ¥: Department of Information and Communication Technology, Mawlana Bhashani Science and Technology University, Santosh, Tangail-1902. e-mail: ictshamim@yahoo.com Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 17 Year 2018 ( ) D
  • 4. methods, statistical feature based methods and global transformation techniques. Statistical approaches are established on planning of how data are selected. It utilizes the information of the statistical distribution of pixels in the image. The paper [8], provided SVM based offline handwritten digit recognition system. Authors claim that SVM outperforms in the experiment. Experiment is carried out on NIST SD19 standard dataset. The study [9] provide the conversion of handwritten data into electronic data, nature of handwritten characters and the neural network approach to form machine competent of recognizing hand written characters. The study [10] addresses a comprehensive criterion of handwritten digit recognition with various state of the art approaches, feature representations, and datasets. However, the relationship of training set size versus accuracy/error and the dataset-independence of the trained models are analyzed. The paper [11] presents convolution neural networks into the handwritten digit recognition research and describes a system which can still be considered state of the art. II. Methods and Materials a) Multilayer Perceptions A neural network based classifier, called Multi- Layer perception (MLP), is used to classify the handwritten digits. Multilayer perceptron consists of three different layers, input layer, hidden layer and output layer. Each of the layers can have certain number of nodes also called neurons and each node in a layer is connected to all other nodes to the next layer [12]. For this reason it is also known as feed forward network. The number of nodes in the input layer depends upon the number of attributes present in the dataset. The number of nodes in the output layer relies on the number of apparent classes exist in the dataset. The convenient number of hidden layers or the convenient number of nodes in a hidden layer for a specific problem is hard to determine. But in general, these numbers are selected experimentally. In multilayer perceptron, the connection between two nodes consists of a weight. During training process, it basically learns the accurate weight adjustment which is corresponds to each connection [13]. For the learning purpose, it uses a supervised learning technique named as Back propagation algorithm. b) Support Vector Machine SVM or Support Vector Machine is a specific type of supervised ML method that intents to classify the data points by maximizing the margin among classes in a high-dimensional space [14]. SVM is a representation of examples as points in space, mapped due to the examples of the separate classes are divided by a fair gap that is as extensive as possible. After that new examples are mapped into that same space and anticipated to reside to a category based on which side of the gap they fall on [15]. The optimum algorithm is developed through a “training” phase in which training data are adopted to develop an algorithm capable to discriminate between groups earlier defined by the operator (e.g. patients vs. controls), and the “testing” phase in which the algorithm is adopted to blind-predict the group to which a new perception belongs [16]. It also provides a very accurate classification performance over the training records and produces enough search space for the accurate classification of future data parameters. Hence it always ensures a series of parameter combinations no less than on a sensible subset of the data. In SVM it’s better to scale the data always; because it will extremely improve the results. Therefore be cautious with big dataset, as it may leads to the increase in the training time. c) J48 The J48 algorithm is developed for the MONK project along with WEKA [17]. The algorithm is an extension for C4.5 decision tree algorithm [18]. There are many options for tree pruning in case of J48 algorithm. The classification algorithms convenient in WEKA try to clarify the results or prune. This method will help us to produces more generic results and also can be used to correct potential over fitting issues. J48 helps to recursively classify until each of the leaf is pruned, that is to classify as close knit to the data. Hence this will helps to ensure the accuracy, although excessive rules will be produced. However pruning will cause to less accuracy of a model on training data. This is due to pruning employs various means to relax the specificity of the decision tree, hopefully improving its performance on the test data. The complete concept is to increasingly generalize a decision tree until it gains a balance of accuracy together with flexibility. The J48 applies two pruning methods. First one is known as subtree replacement. This concludes that nodes in the decision tree can be replaced with a leaf -- which reduces the number of tests along a particular path. This process begins from the leaves of the completely formed tree, and attempts backwards toward the root. Second category of pruning adopted in J48 is termed subtree rising. In this respect, a node can be moved upwards towards the root of the tree, replacing other nodes another way. Subtree rising repeatedly has a insignificant effect on decision tree models. There is generally no clear way to anticipate the utility of the option, though it may be desirable to try turning it off if the induction process is catching a long time. This is because of the fact that subtree rising may be somewhat computationally complicated. Error rates are needed to make actual conclusions about which parts of the tree to rise or replace. There exist multiple ways to perform this. The straight forward way is to reserve a portion of the training data in order to test on decision Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals 1 Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 18 Year 2018 ( ) D
  • 5. tree. Reserved portion may then be adopted as test data for the decision tree, aiding to reduce potential over fitting. This method is recognized as reduced-error pruning. Though the approach is straightforward, it also decreases the overall volume of data available for training the model. For specifically small datasets, it may be advisable to avert using reduced error pruning. d) Random Forest Algorithm Random forest as is an ensemble of un-pruned regression or classification trees, activated from bootstrap samples of the training data, adopting random feature selection in the tree imitation process. The prediction is made by accumulating the predictions of the ensemble by superiority voting for classification. It returns generalization error rate and is more potent to noise. Still, similar to most classifiers, RF may also suffer from the curse of learning from an intensely imbalanced training data set. Since it is constructed to mitigate the overall error rate, it will tend to focus more on the prediction efficiency of the majority class, which repeatedly results in poor accuracy for the minority class. e) Naive Bayes The Naive Bayes classifier [19] contributes a simple method, representing and learning probabilistic knowledge with clear semantics. It is termed naive due to it relies on two important simplifying assumes that predictive attributes are conditionally self-reliant given the class, and it considers that no hidden attributes influence the prediction method. It is a probabilistic classifier which relies upon Bayes theorem with robust and naive independence assumptions. It is one of the best basic text classification approaches with numerous applications in personal email sorting, email spam detection, sexually explicit content detection, document categorization, sentiment detection, language detection [20]. Although the naïve design and oversimplified assumptions that this approach uses, Naive Bayes accomplishes well in many complicated real-world problems. All though it is often out performed by other approaches such as boosted trees, Max Entropy, Support Vector Machines, random forests etc, Naive Bayes classifier is very potent as it is less computationally intensive (in both memory and CPU) and it needs a small extent of training data. Moreover, the training time with Naive Bayes is considerably smaller as opposed to alternative approaches. f) Bayes Net Bayesian networks are a powerful probabilistic representation, and their use for classification has received considerable attention [21]. It reflects the states of some part of a world that is being modeled and it describes how those states are related by probabilities. Bayesian network is a graphical model that encodes probabilistic relationships among variables of interest. When used in conjunction with statistical techniques, the graphical model has several advantages for data analysis. One, because the model encodes dependencies among all variables, it readily handles situations where some data entries are missing. Two, a Bayesian network can be used to learn causal relationships, and hence can be used to gain understanding about a problem domain and to predict the consequences of intervention. This classifier learns from training data the conditional probability of each attribute given the class label [22, 23]. g) Random Tree The algorithm may deal with both regression and classification problems. Random trees is a ensemble of tree predictors which is called forest .The classification performs as follows: random trees classifier takes the input feature vector, categories it with individual tree in the forest, outputs the class label which received the most of “votes”. In the event of a regression, the classifier response is the average of the responses over all the trees in the forest [24]. In random tree algorithm all the trees are trained with the same parameters but on different training sets. These sets are created from the original training set adopting the bootstrap procedure and for each training set, randomly choose the same number of vectors as in the initial set. The vectors are chosen with replacement. That is, some vectors will occur more than once and some will be absent. In random trees there is no need for any accuracy estimation techniques, like cross-validation or bootstrap, or a separate test set to obtain an estimate of the training error. The error is estimated internally during the training. h) Dataset Description The handwritten digit recognition is a extensive research topic which gives a comprehensive survey of the area including major feature sets, learning datasets, and algorithms [25]. Contrary to optical character recognition which focuses on recognition of machine- printed output, where special fonts can be used and the variability between characters along with the same size, font, and font attributes is fairly small. The feature extraction and the classification technique play an important role in offline character recognition system performance. Various feature extraction approaches have been proposed for character recognition system [26]. The problems faced in handwritten numeral recognition has been studied while using the techniques like Dynamic programming, HMM, neural network, Knowledge system and combinations of above techniques [27]. Wider ranging work has been carried out for digit recognition in so many languages like English, Chinese, Japanese, and Arabic. In Indian mainly worked in Devanagari, Tamil, Telugu and Bengali numeral recognition [28]. Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 19 Year 2018 ( ) D
  • 6. In our experiment we used digit dataset provided by Austrian Research Institute for Artificial Intelligence, Austria. This data set indicate that arbitrary scaling and a blur setting of 2.5 for the Mitchell down- sampling filter should perform well and used down- sample to 16x16 pixels. Figure 1: A small portion of handwritten dataset example This dataset is divided in two parts training set and testing set. Training set has 1893 samples and test set has 1796 samples. The detail of the dataset is provided in [29]. III. Experimental Tools Waikato Environment for Knowledge Analysis (WEKA) is a prominent suite of machine learning which is written in Java and developed at the University of Waikato. It is free software accessible under the GNU General Public License. It contains a collection of algorithms and visualization tools for predictive modelling, data analysis, along with graphical user interfaces for smooth access to this functionality [30]. It supports various standard data mining tasks, more particularly, data pre-processing, classification, visualization, clustering, feature selection, regression. All of Weka's approaches are predicated on the assumption that the data is convenient as a single flat file or relation, where each data point is characterized through a fixed number of attributes [31]. WEKA has numerous user interfaces. Its main user interface is the Explorer, however essentially the same functionality can be accessed by the component- based Knowledge Flow interface and from the command line. The Experimenter allows the systematic comparison of the predictive performance of the Weka's machine learning algorithms on an accumulation of datasets. IV. Experimental Result and Discussion WEKA has several graphical user interfaces that enable easy access to the underlying functionality. To gauge and investigate the performance on the selected methods or algorithms namely Support Vector Machine, Multilayer Perceptron, Random Forest Algorithm, Random Tree, Naïve Bayes, Bayes Net and j48 Decision tree algorithms are used. We use the same experiment procedure as suggested by WEKA. In WEKA, all dataset is considered as instances and features in the data are also known as attributes. The experiment results are partitioned into several sub division for easier analysis and evaluation. In the first part, correctly and incorrectly classified instances will be divided in numeric and percentage value and subsequently Kappa statistic, mean absolute error and root mean squared error will be in numeric value. Experiment shows the relative absolute error and root relative squared error in percentage (%) for references and in evaluation process. Our simulation results are shown in below tables-1 and tables-2. In table-1 mainly summarizes the result based on accuracy and time taken for each simulation in our experiment. Moreover, table-2 shows the result based on error during the simulation in WEKA. Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals 1 Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 20 Year 2018 ( ) D
  • 7. Table 1: Simulation result based on accuracy and time consumption Table 2: Simulation result based on different error Based on the above table-1, the highest accuracy is 90.37 % and the lowest is 75.06%. The other algorithm yields an average accuracy of around 83.89%. In fact, the highest accuracy belongs to the Multilayer Perceptron classifier, followed by Support Vector Machine with a percentage of 87.97% and subsequently Random Forest Algorithm 85.75%, Bayes Net 84.35%, Naïve Bayes 81.85%, j48 79.51% and Random Tree 75.06%. Kappa statistics value ranges from 0 to 1. Value 0 means totally disagreement and 1 means full agreement. It checks the reliability of Classifying algorithm on dataset. The total time, mean absolute error, root mean absolute error, relative absolute error and root relative absolute error is also a crucial parameter to build the model in comparing the different classification algorithm. Mean absolute error is the mean of overall error made by classification algorithm and least the error will be best classifier. In the table-2 Multilayer Perceptron has least 0.023 mean absolute errors among all seven algorithms. In [32] experimental results reveal that it is possible to train a face detector without having to label images as containing a face or not. Their experiment is only sensitive to high-level concepts such as cat faces and human bodies. Multi-column deep neural networks for image classification have been presented in [33]. They only improve the state-of-the-art on a plethora of common image classification benchmarks. Supervised learning unsupervised learning, reinforcement learning & evolutionary computation, and indirect search for short programs encoding deep and large networks has been presented in [34]. They only proposed how different Name of Algorithms Correctly Classified Instances % (value) Incorrectly Classified Instances % (Value) Time Taken (seconds) Kappa Statistic Multilayer Perceptron 90.37 9.63 3.15 0.893 Support Vector Machine 87.97 12.03 0.56 0.8664 Random Forest 85.75 14.25 0.44 0.8416 Bayes Net 84.35 15.65 0.86 0.8262 Naïve Bayes 81.85 18.15 3.45 0.7983 J48 79.51 20.49 0.53 0.7722 Random Tree 85.6 24.94 0.55 0.7228 Name of Algorithms Mean Absolute Error Root Mean Squared Error Relative Absolute Error (%) Root Relative Squared Error (%) Multilayer Perceptron 0.023 0.1231 12.78 41.04 Support Vector Machine 0.1611 0.2734 89.49 91.15 Random Forest 0.0593 0.1532 32.97 51.06 Bayes Net 0.0312 0.1745 17.36 58.15 Naïve Bayes 0.0361 0.1879 20.06 62.65 J48 0.0444 0.1957 24.66 65.25 Random Tree 0.0499 0.2234 27.72 74.45 Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 21 Year 2018 ( ) D
  • 8. technique can be used for pattern recognition. In [35] recognition of handwritten bangla basic characters and digits using convex hull based feature set has been proposed. Their experiment result shows that with a database of 10000 samples, the maximum recognition rate of 76.86% is observed for handwritten Bangla characters. Online and offline handwritten Chinese character recognition has been proposed in [36]. Their experiment result reported that the highest test accuracies 89.55% for offline. In our experiment different machine learning algorithm has been used for handwrite digit recognition and obtained highest 90.37% accuracy obtained for Multilayer Perceptron. V. Conclusion The main objective of this investigation is to find a representation of isolated handwritten digits that allow their effective recognition. In this paper used different machine learning algorithm for recognition of handwritten numerals. In any recognition process, the important problem is to address the feature extraction and correct classification approaches. The proposed algorithm tries to address both the factors and well in terms of accuracy and time complexity. The overall highest accuracy 90.37% is achieved in the recognition process by Multilayer Perceptron. This work is carried out as an initial attempt, and the aim of the paper is to facilitate for recognition of handwritten numeral without using any standard classification techniques. References Références Referencias 1. Watada, J., & Pedrycz, W. A fuzzy regression approach to acquisition of linguistic rules. Handbook of Granular Computing, 719-732, 2008. 2. Seewald, A. K. (2011). On the brittleness of handwritten digit recognition models. ISRN Machine Vision, 2012. 3. Kloesgen, W., & Zytkow, J. Handbook of Knowledge Discovery and Data Mining. 4. Das, N., Sarkar, R., Basu, S., Kundu, M., Nasipuri, M., & Basu, D. K. A genetic algorithm based region sampling for selection of local features in handwritten digit recognition application. Applied Soft Computing, 12(5), 1592-1606, 2012. 5. Plamondon, R., & Srihari, S. N. Online and off-line handwriting recognition: a comprehensive survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(1), 63-84. 6. AlKhateeb, J. H., Pauplin, O., Ren, J., & Jiang, J.. Performance of hidden Markov model and dynamic Bayesian network classifiers on handwritten Arabic word recognition. knowledge-based systems, 24(5), 680-688, 2011. 7. Tokas, R., & Bhadu, A. A comparative analysis of feature extraction techniques for handwritten character recognition. International Journal of Advanced Technology & Engineering Research, 2(4), 215-219, 2012. 8. Neves, R. F., Alberto Filho, N. G., Mello, C. A., & Zanchettin, C. A SVM based off-line handwritten digit recognizer. In System, IEEE International Conference on Man, and Cybernetics (SMC) (pp. 510-515), 2011. 9. Perwej, Y., & Chaturvedi, A. Machine recognition of hand written characters using neural networks. arXiv preprint arXiv:1205.3964, 2012. 10. Liu, C. L., Nakashima, K., Sako, H., & Fujisawa, H. Handwritten digit recognition: benchmarking of state-of-the-art techniques. Pattern Recognition, 36(10), 2271-2285. 11. LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278-2324. 12. Bhowmik, S., Roushan, M. G., Sarkar, R., Nasipuri, M., Polley, S., & Malakar, S. Handwritten Bangla Word Recognition Using HOG Descriptor. In 2014 Fourth International Conference of Emerging Applications of Information Technology (EAIT), (pp. 193-197). IEEE, 2014. 13. Kruse, R., Borgelt, C., Klawonn, F., Moewes, C., Steinbrecher, M., & Held, P. Multi-Layer Perceptrons. In Computational Intelligence (pp. 47- 81). Springer London, 2013. 14. Pereira, F., Mitchell, T., & Botvinick, M. Machine learning classifiers and fMRI: a tutorial overview. Neuroimage, 45(1), S199-S209, 2009. 15. Support Vector Machine, Online: https://en. wikipedia.org/wiki/Support_vector_machine, Accessed, August 2015. 16. Orrù, G., Pettersson-Yeo, W., Marquand, A. F., Sartori, G., & Mechelli, A. Using support vector machine to identify imaging biomarkers of neurological and psychiatric disease: a critical review. Neuroscience & Biobehavioral Reviews, 36(4), 1140-1152, 2012. 17. Cooper, G. F., & Herskovits, E. A Bayesian method for constructing Bayesian belief networks from databases. In Proceedings of the Seventh conference on Uncertainty in Artificial Intelligence (pp. 86-94). Morgan Kaufmann Publishers Inc. 18. Salzberg, S. L. C4. 5: Programs for machine learning by j. ross quinlan. morgan kaufmann publishers, inc., 1993. Machine Learning, 16(3), 235-240. 19. John, G. H., & Langley, P. Estimating continuous distributions in Bayesian classifiers. In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence (pp. 338-345). Morgan Kaufmann Publishers Inc. 20. Nguyen, H. A., & Choi, D. Application of data mining to network intrusion detection: classifier selection model. In Challenges for Next Generation Network Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals 1 Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 22 Year 2018 ( ) D
  • 9. Operations and Service Management (pp. 399-408). Springer Berlin Heidelberg, 2008. 21. Bin Othman, M. F., & Yau, T. M. S. Comparison of different classification techniques using WEKA for breast cancer. In 3rd Kuala Lumpur International Conference on Biomedical Engineering 2006 (pp. 520-523). Springer Berlin Heidelberg. 22. Bouckaert, R. R. Properties of Bayesian belief network learning algorithms. In Proceedings of the Tenth international conference on Uncertainty in artificial intelligence (pp. 102-109). Morgan Kaufmann Publishers Inc. 23. Buntine, W. Theory refinement on Bayesian networks. In Proceedings of the Seventh conference on Uncertainty in Artificial Intelligence(pp. 52-60). Morgan Kaufmann Publishers Inc. 24. Random trees, Online: http://docs.opencv.org/ modules/ml/doc/random_trees.html, Accessed, August 2015. 25. Trier, Ø. D., Jain, A. K., & Taxt, T. Feature extraction methods for character recognition-a survey. Pattern recognition, 29(4), 641-662. 26. Koerich, A. L., Sabourin, R., & Suen, C. Y. Large vocabulary off-line handwriting recognition: A survey. Pattern Analysis & Applications, 6(2), 97-121. 27. Rahman, A. F. R., Rahman, R., & Fairhurst, M. C. Recognition of handwritten Bengali characters: a novel multistage approach. Pattern Recognition, 35(5), 997-1006. 28. Chandrasekaran, R., Chandrasekaran, M., & Siromoney, G. Computer recognition of Tamil, Malayalam and Devanagari characters. Journal of the Institution of Electronics and Telecommunication Engineers, 30(6), 150-154. 29. Seewald, A. K. Digits-a dataset for handwritten digit recognition.Austrian Research Institut for Artificial Intelligence Technical Report, Vienna (Austria). 30. Weka Software Documentation, Online: http://www. cs.waikato.ac.nz/ml/weka/,accessed, August 2015. 31. Weka (Machine Learning)Online: https://en. wikipedia.org/wiki/Weka_(machine_learning), accessed, August 2015. 32. Le, Q. V. (2013, May). Building high-level features using large scale unsupervised learning. In 2013 IEEE international conference on acoustics, speech and signal processing (pp. 8595-8598). IEEE. 33. Ciregan, D., Meier, U., & Schmidhuber, J. (2012, June). Multi-column deep neural networks for image classification. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (pp. 3642-3649). IEEE. 34. Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85-117. Elsevier. 35. Das, N., Pramanik, S., Basu, S., Saha, P. K., Sarkar, R., Kundu, M., & Nasipuri, M. (2014). Recognition of handwritten Bangla basic characters and digits using convex hull based feature set. arXiv preprint arXiv:1410.0478. 36. Liu, C. L., Yin, F., Wang, D. H., & Wang, Q. F. (2013). Online and offline handwritten Chinese character recognition: benchmarking on new databases. Pattern Recognition, 46(1), 155-162. Handwritten Digit Recognition using Machine Learning Algorithms © 2018 Global Journals Global Journal of Computer Science and Technology Volume XVIII Issue I Version I 23 Year 2018 ( ) D View publication stats View publication stats